Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Many techniques and algorithms are developed to enhance the security in the cloud environment. This helps the users to secure their server from malicious attacks. Hence the study and investigation of the performance enhanced security algorithms is a must demanded field in the research industry. When large number users using same server to store their information in cloud environment security is a must needed component to preserve the privacy and confidentiality of every individual user. This can be further strengthened by detecting the attacks in earlier stages and taking countermeasure to prevent the attack. Thus securing the data network without any leakage and loss of the information is a challenging task in the cloud environment. When the attacks or intrusion is detected after the occurrence there may be damage to the data in the form of data damage or theft. Hence it is necessary to predict and detect the attacks before the occurrence to protect the privacy and confidentiality of the user information.
Czasopismo
Rocznik
Tom
Strony
1--6
Opis fizyczny
Bibliogr. 21 poz., fig., tab.
Twórcy
autor
- Institute of Computer Science & Information Sciences, Srinivas University,Mangalore, Karnataka, India
autor
- Institute of Computer Science & Information Sciences, Srinivas University,Mangalore, Karnataka, India
Bibliografia
- 1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, Above the clouds: A berkeley view of cloud com-puting, Technical Report No. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009).
- 2. N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: A survey, Future generation computer systems 29(1) (2013) 84-106 DOI: https://doi.org/10.1016/j.future.2012.05.023
- 3. C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big Data and cloud computing: innovation opportunities and challenges, International Journal of Digital Earth 10(1) (2017) 13-53.DOI: https://doi.org/10.1080/17538947.2016.1239771
- 4. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications 34(1) (2011) 1-11.DOI: https://doi.org/10.1016/j.jnca.2010.07.006
- 5. M.A. Rababaa, M.A. Kofahi, F.A. Saqqar, S.A. Rababavh, Hash algorithms for security on GSM system, International Review on Computers and Software 4 (2009) 698-703.
- 6. M. Ali, S.U. Khan, A.V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information sciences 305 (2015) 357-383.DOI: https://doi.org/10.1016/j.ins.2015.01.025
- 7. N. Santos, K.P. Gummadi, R. Rodrigues, Towards Trusted Cloud Computing, HotCloud 9(9) (2009) 3.
- 8. H. Hui, D. McLernon, Design and Application of a Service Outsourcing Cloud for the Insurance Industry, Proceedings of the 9th International Conference on Information Communication and Management (2019) 1-5.DOI: https://doi.org/10.1145/3357419.3357420
- 9. S. Srisakthi, A.P. Shanthi,Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR), Wireless Personal Communications 114(4) (2020) 3003-3015.DOI: https://doi.org/10.1007/s11277-020-07514-9
- 10. S. Namasudra, R. Chakraborty, A. Majumder, Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16(3s) (2020) 1-19.DOI: https://doi.org/10.1145/3392665
- 11. P. Sivakumar, M. NandhaKumar, R. Jayaraj, A. Sakthi Kumaran, Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud, IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) (2019) 1-5.DOI: https://doi.org/10.1109/ICSCAN.2019.8878749
- 12. A.K. Gautam, R. Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, SN Applied Sciences 3(1) (2021) 1-27.DOI: https://doi.org/10.1007/s42452-020-04089-9
- 13. S.P. Kumar, A. Aswini, M. Kavithadevi, S. Ramya, Improvised dedupication with keys and chunks in HDFS storage, Third International Conference on Science Technology Engineering & Management (ICONSTEM), (2017) 226-230.DOI: https://doi.org/10.1109/ICONSTEM.2017.8261419
- 14. M.B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, Y. Khamayseh, Comprehensive study of symmetric key and asymmetric key encryption algorithms, International conference on engineering and technology (ICET) (2017) 1-7.DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308215
- 15. A. Bhuvaneshwaran, P. Manickam, M. Ilayaraja, K. Sathesh Kumar, K. Shankar, Clustering Based Cybersecurity Model for Cloud Data, Cyber security and Secure Information Systems (2019) 227-240.DOI: https://doi.org/10.1007/978-3-030-16837-7_11
- 16. A. El-Yahyaoui, M.D.E.C. El Kettani, Data privacy in cloud computing, 4th International Conference on Computer and Technology Applications (ICCTA) (2018) 25-28.DOI: https://doi.org/10.1109/CATA.2018.8398650
- 17. Z.H. Mahmood, M.K. Ibrahem, New fully homomorphic encryption scheme based on multistage partial homomorphic encryption applied in cloud computing, 1st Annual International Conference on Information and Sciences (AiCIS) (2018) 182-186.DOI: https://doi.org/10.1109/AiCIS.2018.00043
- 18. R. Gayatri, Y. Gayatri, Detection of Trojan based DoS Attacks on RSA Cryptosystem using Hybrid Supervised Learning Models, IEEE Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (2020) 1-5.DOI: https://doi.org/10.1109/ICSSIT48917.2020.9214116
- 19. D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems 28(3) (2012) 583-592.DOI: https://doi.org/10.1016/j.future.2010.12.006
- 20. A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, The rise of big data on cloud computing: Review and open research issues, Information systems 47 (2015) 98-115.DOI: https://doi.org/10.1016/j.is.2014.07.006
- 21. D. Sun, G. Chang, L. Sun, X. Wang, Surveying and analyzing security, privacy and trust issues in cloud computing environments, Procedia Engineering 15 (2011) 2852-2856.DOI: https://doi.org/10.1016/j.proeng.2011.08.537
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-6cc37acf-98bc-437d-ada2-08266031c8e1